Networks and Communications Security

  • 4.7
Approx. 20 hours to complete

Course Summary

This course covers the fundamentals of network security and communications, including types of attacks, cryptography, and network topologies. Students will gain a solid understanding of how to protect networks against threats and secure communications.

Key Learning Points

  • Learn how to identify and prevent common network attacks
  • Explore different types of cryptography and how to use it to secure communications
  • Understand different network topologies and their security implications

Related Topics for further study


Learning Outcomes

  • Identify and prevent common network attacks
  • Implement cryptography to secure communications
  • Understand the security implications of different network topologies

Prerequisites or good to have knowledge before taking this course

  • Basic understanding of networking concepts
  • Familiarity with operating systems and command line interfaces

Course Difficulty Level

Intermediate

Course Format

  • Online
  • Self-paced
  • Video lectures
  • Quizzes

Similar Courses

  • Introduction to Cybersecurity
  • Cybersecurity Essentials

Related Education Paths


Notable People in This Field

  • Bruce Schneier
  • Mikko Hyppönen

Related Books

Description

Welcome to Networks and Communications Security Course!

Outline

  • Understand Security Issues Related to Networks
  • Networks and Communications Security
  • Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)
  • Understand Security Issues: OSI Model (Layers 1,2, and 3)
  • Understand Security Issues: OSI Model
  • Understand Security Issues: Layers Review
  • Understand Security Issues: Layers Review
  • Understand Security Issues: IP Networking
  • Understand Security Issues: Network Classes
  • Understand Security Issues: IPv6
  • Understand Security Issues: DHCP
  • Understand Security Issues: DHCP
  • Understand Security Issues: ICMP
  • Understand Security Issues: Ping Scanning
  • Understand Security Issues: RPC
  • Understand Security Issues: Ring
  • Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions
  • Understand Security Issues: Packet-Switched Networks
  • Understand Security Issues: CSMA
  • Understand Security Issues: FDDI
  • Understand Security Issues: DNS
  • Understand Security Issues: DNS
  • Understand Security Issues: DNS Quick Reference
  • Understand Security Issues: FTP
  • Understand Security Issues: Proxies
  • Understand Security Issues: HTTP Tunneling
  • Understand Security Issues: SCADA Attacks
  • Networks and Communications Security
  • Understand Security Issues: OSI Model (Layers 4, 5, 6, and 7)
  • Understand Security Issues: OSI Model (Layers 1,2, and 3)
  • Understand Security Issues: Layers Review
  • Understand Security Issues: Layers Review
  • Understand Security Issues: IP Networking
  • Understand Security Issues: Network Classes
  • Understand Security Issues: IPv6
  • Understand Security Issues: DHCP
  • Understand Security Issues: DHCP
  • Understand Security Issues: ICMP
  • Understand Security Issues: Ping Scanning
  • Understand Security Issues: RPC
  • Understand Security Issues: Ring
  • Understand Security Issues: Unicast, Multicast, and Broadcast Transmissions
  • Understand Security Issues: Packet-Switched Networks
  • Understand Security Issues: CSMA
  • Understand Security Issues: FDDI
  • Understand Security Issues: DNS Quick Reference
  • Understand Security Issues: FTP
  • Understand Security Issues: Proxies
  • Understand Security Issues: HTTP Tunneling
  • Understand Security Issues: SCADA Attacks
  • Quiz 1
  • Protect Telecommunications Technologies and Control Network Access
  • Protect Telecommunications Technologies: IP Convergence
  • Protect Telecommunications Technologies: MPLS
  • Protect Telecommunications Technologies: MPLS L3 VPNs
  • Protect Telecommunications Technologies: SIP
  • Control Network Access: Access Control and Monitoring
  • Control Network Access: Blind Spoofing
  • Control Network Access: Bastion Host
  • Control Network Access: Wired Transmissions
  • Control Network Access: Patch Panels
  • Control Network Access: Remote Meeting Technology
  • Control Network Access: PPTP
  • Control Network Access: SNMP
  • Control Network Access: Virtual Network Terminal Services
  • Protect Telecommunications Technologies: IP Convergence
  • Protect Telecommunications Technologies: MPLS
  • Protect Telecommunications Technologies: MPLS L3 VPNs
  • Protect Telecommunications Technologies: SIP
  • Control Network Access: Access Control and Monitoring
  • Control Network Access: Blind Spoofing
  • Control Network Access: Bastion Host
  • Control Network Access: Wired Transmissions
  • Control Network Access: Patch Panels
  • Control Network Access: Remote Meeting Technology
  • Control Network Access: PPTP
  • Control Network Access: SNMP
  • Control Network Access: Virtual Network Terminal Services
  • Quiz 2
  • Operate and Configure Network-Based Security Devices
  • Network-Based Security Devices: Network as a Bastion of Defense
  • Network-Based Security Devices: Availability
  • Network-Based Security Devices: Open Mail Relay Servers
  • Network-Based Security Devices: NAT
  • Network-Based Security Devices: Proxies
  • Network-Based Security Devices: FIN, NULL, and XMAS Scanning
  • Network-Based Security Devices: IDS
  • Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets
  • Network-Based Security Devices: Smurf and Fraggle Attacks
  • Network-Based Security Devices: DoS
  • Network-Based Security Devices: Manipulation of DNS Queries
  • Network-Based Security Devices: Network as a Bastion of Defense
  • Network-Based Security Devices: Availability
  • Network-Based Security Devices: Open Mail Relay Servers
  • Network-Based Security Devices: NAT
  • Network-Based Security Devices: Proxies
  • Network-Based Security Devices: FIN, NULL, and XMAS Scanning
  • Network-Based Security Devices: IDS
  • Network-Based Security Devices: IP Fragmentation Attacks and Crafted Packets
  • Network-Based Security Devices: Smurf and Fraggle Attacks
  • Network-Based Security Devices: DoS
  • Network-Based Security Devices: Manipulation of DNS Queries
  • Quiz 3
  • Manage LAN-Based Security and Implement and Operate Wireless Technologies
  • LAN-Based Security: Separation of Data Plane and Control Plane
  • LAN-Based Security: Segmentation
  • LAN-Based Security: How Does Tagging Work?
  • LAN-Based Security: Common Attacks Against the Data-Link Layer
  • LAN-Based Security: Secure Device Management
  • LAN-Based Security: DNSSEC
  • Implement and Operate Wireless Technologies: Types of Wireless Technologies
  • Implement and Operate Wireless Technologies: TDMA
  • Implement and Operate Wireless Technologies: Infrastructure Mode
  • Implement and Operate Wireless Technologies: Share Key Authentication Flaw
  • LAN-Based Security: Separation of Data Plane and Control Plane
  • LAN-Based Security: Segmentation
  • LAN-Based Security: How Does Tagging Work?
  • LAN-Based Security: Common Attacks Against the Data-Link Layer
  • LAN-Based Security: Secure Device Management
  • LAN-Based Security: DNSSEC
  • Implement and Operate Wireless Technologies: Types of Wireless Technologies
  • Implement and Operate Wireless Technologies: TDMA
  • Implement and Operate Wireless Technologies: Infrastructure Mode
  • Implement and Operate Wireless Technologies: Share Key Authentication Flaw
  • Quiz 4
  • Case Study
  • End-Of Course Assessment
  • SSCP Exam Information
  • Networks and Communications Security Assessment

Summary of User Reviews

Discover the world of network security and communications with the SSCP certification course. Students found this course to be informative and engaging, with a focus on practical skills that can be applied in the real world.

Key Aspect Users Liked About This Course

Many users praised the course's emphasis on real-world skills and practical applications.

Pros from User Reviews

  • Clear and concise explanations of complex concepts
  • Engaging and interactive course materials
  • Instructors with real-world experience in network security
  • Good preparation for the SSCP certification exam
  • Excellent customer support

Cons from User Reviews

  • Some users found the course content to be too basic
  • Occasional technical issues with the online platform
  • Limited opportunities for interaction with instructors and peers
  • Course materials can be overwhelming for beginners
  • Lack of advanced topics for more experienced professionals
English
Available now
Approx. 20 hours to complete
(ISC)² Education & Training
(ISC)²
Coursera

Instructor

Share
Saved Course list
Cancel
Get Course Update
Computer Courses